Skip to main content

Tyler K Bletsch

Assistant Professor of the Practice in the Department of Electrical and Computer Engineering
Electrical and Computer Engineering
Box 90291, Durham, NC 27708
103 Wilkinson Building, Durham, NC 27708

Selected Publications


Rowhammer Vulnerability of DRAMs in 3-D Integration

Journal Article IEEE Transactions on Very Large Scale Integration (VLSI) Systems · May 1, 2024 We investigate the vulnerability of 3-D-integrated dynamic random access memorys (DRAMs) [i.e., typically connected with silicon via (TSV), monolithic interconnect via (MIV)] to Rowhammer attacks. We have developed a SPICE framework to characterize Rowhamm ... Full text Cite

Machine Learning-Based Rowhammer Mitigation

Journal Article IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems · May 1, 2023 Rowhammer is a security vulnerability that arises due to the undesirable electrical interaction between physically adjacent rows in DRAMs. Bit flips caused by Rowhammer can be exploited to craft many types of attacks in platforms ranging from edge devices ... Full text Cite

Simply-Track-and-Refresh: Efficient and Scalable Rowhammer Mitigation

Conference Proceedings - International Test Conference · January 1, 2023 Rowhammer is a memory vulnerability that can compromise system-level security. Rowhammer occurs when a DRAM row is accessed repeatedly, potentially causing bit-flips for neighboring rows. The threshold for Rowhammer has decreased from 139K accesses in 2014 ... Full text Cite

Learning to Mitigate Rowhammer Attacks

Conference Proceedings of the 2022 Design, Automation and Test in Europe Conference and Exhibition, DATE 2022 · January 1, 2022 Rowhammer is a vulnerability that arises due to the undesirable interaction between physically adjacent rows in DRAMs. Existing DRAM protections are not adequate to defend against Rowhammer attacks. We propose a Rowhammer mitigation solution using machine ... Full text Cite

Mitigating code-reuse attacks with control-flow locking

Conference ACM International Conference Proceeding Series · December 1, 2011 Code-reuse attacks are software exploits in which an attacker directs control flow through existing code with a malicious result. One such technique, return-oriented programming, is based on"gadgets" (short pre-existing sequences of code ending in a ret in ... Full text Cite

Comprehensive and efficient protection of kernel control data

Journal Article IEEE Transactions on Information Forensics and Security · December 1, 2011 Protecting kernel control data (e.g., function pointers and return addresses) has been a serious issue plaguing rootkit defenders. In particular, rootkit authors only need to compromise one piece of control data to launch their attacks, while defenders nee ... Full text Cite

On the expressiveness of return-into-libc attacks

Conference Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) · December 1, 2011 Return-into-libc (RILC) is one of the most common forms of code-reuse attacks. In this attack, an intruder uses a buffer overflow or other exploit to redirect control flow through existing (libc) functions within the legitimate program. While dangerous, it ... Full text Cite

Jump-oriented programming: A new class of code-reuse attack

Conference Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011 · January 1, 2011 Return-oriented programming is an effective code-reuse attack in which short code sequences ending in a ret instruction are found within existing binaries and executed in arbitrary order by taking control of the stack. This allows for Turing-complete behav ... Full text Cite

Adagio: Making DVS practical for complex HPC applications

Conference Proceedings of the International Conference on Supercomputing · November 24, 2009 Power and energy are first-order design constraints in high performance computing. Current research using dynamic voltage scaling (DVS) relies on trading increased execution time for energy savings, which is unacceptable for most high performance computing ... Full text Cite

PADD: Power-aware domain distribution

Conference Proceedings - International Conference on Distributed Computing Systems · October 27, 2009 Modern data centers usually have computing resources sized to handle expected peak demand, but average demand is generally much lower than peak. This means that the systems in the data center usually operate at very low utilization rates. Past techniques h ... Full text Cite

The effect of aging on low-fat, reduced-fat, and full-fat Cheddar cheese texture.

Journal Article Journal of dairy science · October 2009 This study investigated the effects of aging and fat content on the texture of Cheddar cheese, both mechanical and sensory aspects, over a 9-mo aging period. Cheeses of 6, 16, and 33% fat were tested at 0.5, 3, 6, and 9 mo of aging. Cheeses were evaluated ... Full text Cite

Just-in-time dynamic voltage scaling: Exploiting inter-node slack to save energy in MPI programs

Journal Article Journal of Parallel and Distributed Computing · September 1, 2008 Although users of high-performance computing are most interested in raw performance, both energy and power consumption have become critical concerns. As a result, improving energy efficiency of nodes on HPC machines has become important, and the prevalence ... Full text Cite

Scaling and packing on a chip multiprocessor

Conference Proceedings - 21st International Parallel and Distributed Processing Symposium, IPDPS 2007; Abstracts and CD-ROM · September 24, 2007 Power management is critical in server and high-performance computing environments as well as in mobile computing. Many mechanisms have been developed over recent years to support a wide a variety of power management techniques. In particular, general purp ... Full text Cite